Tales from the BlackHat NOC: Learning from the right people

The week I spent in the BlackHat NOC was great exposure to both new and evolving technology and new people. As a team member of the RSA team in the BlackHat NOC I tried to approach my time there by learning as much as I could about not only the data on the network, but how our products function…

The post Tales from the BlackHat NOC: Learning from the right people appeared first on Speaking of Security – The RSA Blog and Podcast.

Continue reading Tales from the BlackHat NOC: Learning from the right people

Tales from the Black Hat NOC: The Stages of Security Adolescence (Part 2)

In Part 1 of “Tales of the Black Hat NOC: The Stages of Security Adolescence,” I discussed the maturation process of the Black Hat NOC, and security strategies in general.  In the blog post below – you can see the adjustments we made and additional steps we took towards optimizing our NOC at Black Hat. …

The post Tales from the Black Hat NOC: The Stages of Security Adolescence (Part 2) appeared first on Speaking of Security – The RSA Blog and Podcast.

Continue reading Tales from the Black Hat NOC: The Stages of Security Adolescence (Part 2)

Your Step-Up Authentication Compass… NIST & SMS – Finding North

An estuary is the area where a river meets the sea (or ocean), where fresh water from the river meets salt water from the sea. The fresh draft of the NIST Digital Authentication Guidance (NIST SP800-63B) has been let loose into the salt waters of the public and certainly provoked some conversation of late around…

The post Your Step-Up Authentication Compass… NIST & SMS – Finding North appeared first on Speaking of Security – The RSA Blog and Podcast.

Continue reading Your Step-Up Authentication Compass… NIST & SMS – Finding North

After Black Hat: Shaming is Easy (When You Don’t Encrypt)

During the Black Hat 2016 NOC outbrief session, Grifter, aka Neil Wyler made a counter-intuitive statement to the crowd of roughly 500, eager to see which of their online activities would be exposed center stage: “I look forward to the day when I can’t see anything you’re doing on the Black Hat network”. Wait… what?…

The post After Black Hat: Shaming is Easy (When You Don’t Encrypt) appeared first on Speaking of Security – The RSA Blog and Podcast.

Continue reading After Black Hat: Shaming is Easy (When You Don’t Encrypt)

A New Generation of Hackers Target the Gaming Industry

Hackers love a crowd. That’s true when it comes to social media networks, government system websites, financial institutions, retailers, and, based on recent headlines, gaming sites.  For an industry projected to be worth nearly $100 billion in 2016, gaming offers a lucrative industry for cybercriminals.  Last year, gaming accounted for 1 in every 50 e-commerce fraud transactions,…

The post A New Generation of Hackers Target the Gaming Industry appeared first on Speaking of Security – The RSA Blog and Podcast.

Continue reading A New Generation of Hackers Target the Gaming Industry

Tales from the Black Hat NOC: The Stages of Security Adolescence (Part 1)

Maturity is often spoken of in the security community as a binary value – “Customer X is mature,” “Customer Y is immature…” This notion was not dispelled at Black Hat where one vendor after another claimed, “Evolve your security. Buy our product and stop breaches today!” But we know that maturity is not binary, and neither is…

The post Tales from the Black Hat NOC: The Stages of Security Adolescence (Part 1) appeared first on Speaking of Security – The RSA Blog and Podcast.

Continue reading Tales from the Black Hat NOC: The Stages of Security Adolescence (Part 1)

Could Your Smart Home Put You at Risk?

The Internet of Things (IoT) is slowly taking over consumer markets in every category, from coffee makers to fitness trackers. Yet while smart automation might seem like the ideal for consumer convenience, when it comes to home security systems, connecting to the Internet can lead to increased vulnerability. In this article, we take a look […]… Read More

The post Could Your Smart Home Put You at Risk? appeared first on The State of Security.

Continue reading Could Your Smart Home Put You at Risk?

Homemade EDM Can Cut Through Difficult Materials Like Magnets With Ease

Many years ago [ScorchWorks] built an electrical-discharge machining tool (EDM) and recently decided to write about it. And there’s a video embedded after the break.

The build is based on the designs described in the book “Build an EDM” by Robert Langolois. An EDM works by creating lots of little electrical discharges between an electrode in the desired shape and a material underneath a dielectric solvent bath. This dissolves the material exactly where the operator would like it dissolved. It is one of the most precise and gentle machining operations possible.

His EDM is built mostly out of found parts. …read more

Continue reading Homemade EDM Can Cut Through Difficult Materials Like Magnets With Ease

Tales From The Black Hat NOC: Chaos: So Organized, Even a T-Rex Can Do It

By Wednesday morning at Black Hat, the traffic profile switched from compartmentalized, per-classroom monitoring to a more distributed and chaotic sea of general conference wireless. This meant a shift from mostly student laptop-generated traffic, to about 90% of all Black Hat activity being generated by mobile devices. Choosing how to monitor an environment like this, given no…

The post Tales From The Black Hat NOC: Chaos: So Organized, Even a T-Rex Can Do It appeared first on Speaking of Security – The RSA Blog and Podcast.

Continue reading Tales From The Black Hat NOC: Chaos: So Organized, Even a T-Rex Can Do It

TALES FROM THE BLACK HAT NOC: WHAT’S IN YOUR CLASSROOM?

  Hanging in the NOC these last couple of days has confirmed one thing.  Creation of content to support an information security program is an ongoing process.  It starts with the identification and deployment of out-of-the-box content useful for the audience, but a good security operations plan does not stop there. The RSA NOC team…

The post TALES FROM THE BLACK HAT NOC: WHAT’S IN YOUR CLASSROOM? appeared first on Speaking of Security – The RSA Blog and Podcast.

Continue reading TALES FROM THE BLACK HAT NOC: WHAT’S IN YOUR CLASSROOM?